Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICICT
ICICT 2023
Generate Citations
2023 6th International Conference on Information and Computer Technologies (ICICT)
March 24 2023 to March 26 2023
Raleigh, NC, USA
ISBN: 979-8-3503-0095-6
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-9
Preface
Freely available from IEEE.
pp. 10-10
Conference Organization
Freely available from IEEE.
pp. 11-11
Technical Program Committee
Freely available from IEEE.
pp. 12-12
Human Wellness in the Cape Fear River Basin Based on CAFO Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Timothy Hamilton
,
Elif Sahin
,
Andrew Ayers
,
Alexander Cossifos
,
Gulustan Dogan
,
Eric Moore
Comparison of Machine and Deep Learning Models for the Prediction of Land Degradation
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-12
by
Joshua Edwards
,
Gulustan Dogan
,
Narcisa Pricope
Educational Group Formation Problem Resolution Based on an Improved Swarm Particle Optimization Using Fuzzy Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-21
by
Bikhtiyar Hasan
,
Amine Boufaied
Research on Supermarket Marketing Data Analysis Based on Business Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-28
by
Zhao Mei
,
Li Mingjie
An Approach to Maintain the Balance between Exploitation and Exploration of the Evolutionary Process in Multi-objective Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Minh Tran Binh
,
Long Nguyen
,
Dinh Nguyen Duc
Rainfall Forecasting with Variational Autoencoders and LSTMs
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Eron Neill
,
Gulustan Dogan
Using Artificial Intelligence to Detect Falls
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-44
by
Jonathan Sturdivant
,
Nicholas Morris
,
Tiara Hendricks
,
Gulustan Dogan
,
Michel Heijnen
Web Injection and Banking Trojan Malware -A Systematic Literature Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-53
by
Tjada Nelson
,
Cory Nance
,
Cherie Noteboom
Time-series method for predicting human traffic flow: A case study of Cañar, Ecuador
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
Danny Salto-Sumba
,
Juan Vazquez-Verdugo
,
Jd Jara
,
Jp Bermeo
SE-RCN: An Economical Capsule Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Sami Naqvi
,
Mohamed El-Sharkawy
Human Tissue Cell Image Segmentation optimization Algorithm Based on Improved U-net Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-71
by
Jie Ying
,
Xin Jing
,
Chenyang Qin
,
Wei Huang
Printed Circuit Board Defect Detection Based on Improved YOLOv5
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-77
by
Tong Yang
,
Yuguo Liu
,
Changxin Jin
,
Kai Jiang
,
Qiang Duan
,
Chen Song
,
Qibin Chen
,
Xue Li
,
Junzheng Ge
,
Rui Li
AG-UN-Net: U-shaped and N-shaped network with attention gate for liver segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Quchen Zou
,
Xinde Li
,
Chuanfei Hu
A Combined Method for Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-88
by
Laura Mukhamadiyeva
,
Aiman Moldagulova
Design Methodology for Single-Channel CNN-Based FER Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
Dorfell Parra
,
Carlos Camargo
Intracranial Brain Hemorrhage Diagnosis and Classification: A Hybrid Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Md Imdadul Haque Emon
,
Khondoker Nazia Iqbal
,
Istinub Azad
,
Amena Akter Aporna
,
Nibraj Safwan Amlan
,
Md Saiful Islam
,
Rafeed Rahman
Lung Cancer Classification and Prediction of Disease Severity Score Using Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-104
by
Rajkumar Maharaju
,
Rama Valupadasu
Named Entity Recognition for peer-review disambiguation in academic publishing
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-114
by
Milos Cuculovic
,
Frederic Fondement
,
Maxime Devanne
,
Jonathan Weber
,
Michel Hassenforder
Long Text Classification Using Pre-trained Language Model for a Low-Resource Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Hailemariam Mehari Yohannes
,
Toshiyuki Amagasa
Detecting Fake News Using Machine Learning Based Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Ty Edwards
,
Ridwan Rashid Noel
Discovering Coherent Topics from Urdu Text: A Comparative Study of Statistical Models, Clustering Techniques and Word Embedding
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-131
by
Mubashar Mustafa
,
Feng Zeng
,
Usama Manzoor
,
Lin Meng
Monitoring of Parkinson’s Disease Progression based on Speech Signal
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Daria Hemmerling
,
Magdalena Wójcik-Pȩdziwiatr
,
Paweł Jaciów
,
Bartosz Ziółko
,
Magdalena Igras-Cybulska
On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective?
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Phornsawan Roemsri
,
Supadchaya Puangpontip
,
Rattikorn Hewett
Consideration for Creation of Training Samples for Targeted Malware Detection by Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-149
by
Ryuya Uda
,
Taeko Kotani
Risk Assessment of Cloud Infrastructure and Services for Software Development Startups
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Ardian Isufi
,
Marika Apostolova
Development of Build–MaaS Architecture, a Mobility-as-a-Service platform for the Construction Sector
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Djamel Khadraoui
,
Christophe Feltus
A Solution to Channel Aging in 5G Massive MIMO
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-166
by
Talha Younas
,
Muluneh Mekonnen
,
Ghulam Farid
,
Hafiz Mudassir Munir
,
Osama Younas
Deployment of Proposed EfficientNeXt on NXP i.MX 8M Mini
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-170
by
Abhishek Deokar
,
Mohamed El-Sharkawy
An Optimal Machine Learning Framework for the Enhancement of Intrusion Detection in Wireless Sensor Network Using Metaheuristic and RNS Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Ifedotun Roseline. Idowu
,
Ayisat Wuraola Asaju-Gbolagade
,
Kazeem Alagbe Gbolagade
Adaptive Handover Decision Algorithm for Load Balancing in 5G Heterogeneous Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-181
by
Emre Gures
,
Ibraheem Shayea
,
Sawsan Ali Saad
,
Ayman A. El-Saleh
mpiPython: Prospects for Node Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Judah Nava
,
Hanku Lee
Improved Consistency in Price Negotiation Dialogue System Using Parameterized Action Space with Generative Adversarial Imitation Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-197
by
Makoto Sato
,
Tomohiro Takagi
A Content-Based Dataset Recommendation System for Biomedical Datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-202
by
Zitong Zhang
,
Yaseen Ashraf
Representation Theorems Obtained by Mining across Web Sources for Hints
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-210
by
Marco B. Caminati
,
Juliana K. F. Bowles
Blockchain-based Certificate Management with Multi-Party Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-219
by
Lei Xu
,
Xue Song
,
Jipeng Hou
,
Liehuang Zhu
Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Eric Blancaflor
,
Harold Kobe S. Billo
,
Bianca Ysabel P. Saunar
,
John Michael P. Dignadice
,
Philip T. Domondon
Image-Based Indoor Localization Using Smartphone Cameras In Textureless Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Ping Zheng
,
Danyang Qin
,
Jianan Bai
,
Lin Ma
Ethical implications of using artificial intelligence for multimodal biometric selection model evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-238
by
Elisa Maeko
,
Dustin Van Der Haar
Author Index
Freely available from IEEE.
pp. 239-240
Showing 46 out of 46